Meihua Xiao

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
To precisely understand human gaze behaviors in three-party conversations, this work is dedicated to look into whether the speaker can be reliably identified from the interlocutors in a three-party conversation on the basis of the interactive behaviors of eye contact, where speech signals are not provided. Derived from a pre-recorded, multimodal, and(More)
—Model checking has been successfully applied to verify the security properties of network protocols. In this paper, we propose a formal modeling method using the PROMELA language based on simplified model of SET payment protocol proposed by Lu & Smolka, and use LTL to describe authentication property. Under the hypothesis of the network environment being(More)
Model checking is to check whether a bounded state system can meet their design specifications using state-space search approach automatically. This paper describes the key exchange protocol SSL 3.0, and conducts a formalized analysis and modeling and verification of the protocol by using the famous model checker tool SPIN. The LTL property is dynamically(More)
This paper explores online learning and batch algorithms for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. A data set has been built including malicious and benign URLs, and data mining system Weka has been used as an aid to classify the existent URLs and new coming URLs and(More)
Localization is very important for the applications in wireless sensor network. For the disadvantage that the accuracy of traditional DV-Hop algorithm is low, this paper proposes an improved DV-Hop localization algorithm named NDV-Hop (Novel improved DV-Hop algorithm). NDV-Hop takes some improvements over DV-Hop from the following aspects: firstly, average(More)
Formal methods are vital for ensuring the security and reliability of the network systems. We propose a promising method to check security properties of cryptographic protocols using logic of events theory. The logic is designed around a message automaton with actions for possible protocol steps including generating new nonces, sending and receiving(More)
The analysis and verification of security protocols is an important field in the security of computer nowadays. Model checking technique to the analysis of security protocols has proved remarkably successful, which involves three parts: modeling of system behaviors, description of system properties and system verification. Modeling of system behaviors is a(More)
protocols flaws are notoriously difficult to detect. Comparatively little attention has been given to logics of knowledge, although such logics have been proven to be very useful in the specifications of protocols for communication systems. We address ourselves to the analysis of security protocols under the Dolev-Yao model by using a logic of algorithmic(More)
  • 1